Skip to main content
Log in

Prediction of IIoT traffic using a modified whale optimization approach integrated with random forest classifier

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Several organizations are implementing large-scale Internet of Things (IoT)-based ecosystems, such as Industrial IoT (IIoT). Such systems are vulnerable to new threats and intrusions because of the nature of their networks. It is necessary to secure such systems by developing feature selection integrated with robust machine learning models. In this paper, a two-phase IIoT traffic prediction model is built for detecting normal and anomalous IIoT behavior. The system is divided into two phases. In the first phase, multi-objective non-dominated sorting with whale optimization approach (MNSWOA) and ideal point method (IPM) is implemented for feature selection. The key quality attributes are retrieved for effective classification. In the second phase, the feature selection results are sent to the random forest (RF) classifier for traffic prediction. Experimental results on IIoT datasets, namely CTU-13, AWID and Gas–Water show that the proposed technique MNSWOA–IPM–RF obtains enhanced performance in terms of accuracy, true positive rate, true negative rate and area under the ROC curve. Also, comparisons indicate that the proposed MNSWOA–IPM–RF model has superior results than benchmark multi-objective optimization techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Morris T, Gao W (2014) Industrial control system traffic data sets for intrusion detection research. In: International Conference on Critical Infrastructure Protection. Springer, Berlin, pp 65–78

  2. Panigrahi R, Borah S, Bhoi AK, Ijaz MF, Pramanik M, Jhaveri RH, Chowdhary CL (2021) Performance assessment of supervised classifiers for designing intrusion detection systems: a comprehensive review and recommendations for future research. Mathematics 9(6):690

    Article  Google Scholar 

  3. Panigrahi R, Borah S, Bhoi AK, Ijaz MF, Pramanik M, Kumar Y, Jhaveri RH (2021) A consolidated decision tree-based intrusion detection system for binary and multiclass imbalanced datasets. Mathematics 9(7):751

    Article  Google Scholar 

  4. Satapathy SC, Naik A (2014) Modified teaching–learning-based optimization algorithm for global numerical optimization—a comparative study. Swarm Evol Comput 16:28–37

    Article  Google Scholar 

  5. Li AD, He Z, Zhang Y (2016) Bi-objective variable selection for key quality characteristics selection based on a modified NSGA-II and the ideal point method. Comput Ind 82:95–103

    Article  Google Scholar 

  6. Xue B, Zhang M, Browne WN, Yao X (2015) A survey on evolutionary computation approaches to feature selection. IEEE Trans Evol Comput 20(4):606–626

    Article  Google Scholar 

  7. Mistry K, Zhang L, Neoh SC, Lim CP, Fielding B (2016) A micro-GA embedded PSO feature selection approach to intelligent facial emotion recognition. IEEE Trans Cybern 47(6):1496–1509

    Article  Google Scholar 

  8. Rosales-Pérez A, García S, Gonzalez JA, Coello CAC, Herrera F (2017) An evolutionary multiobjective model and instance selection for support vector machines with pareto-based ensembles. IEEE Trans Evol Comput 21(6):863–877

    Article  Google Scholar 

  9. Li AD, He Z (2020) Multiobjective feature selection for key quality characteristic identification in production processes using a nondominated-sorting-based whale optimization algorithm. Comput Ind Eng 149:106852

    Article  Google Scholar 

  10. Nguyen HB, Xue B, Liu I, Andreae P, Zhang M (2016) New mechanism for archive maintenance in PSO-based multi-objective feature selection. Soft Comput 20(10):3927–3946

    Article  Google Scholar 

  11. Amoozegar M, Minaei-Bidgoli B (2018) Optimizing multi-objective PSO based feature selection method using a feature elitism mechanism. Expert Syst Appl 113:499–514

    Article  Google Scholar 

  12. Zhang Y, Cheng S, Shi Y, Gong DW, Zhao X (2019) Cost-sensitive feature selection using two-archive multi-objective artificial bee colony algorithm. Expert Syst Appl 137:46–58

    Article  Google Scholar 

  13. Hancer E, Xue B, Zhang M, Karaboga D, Akay B (2018) Pareto front feature selection based on artificial bee colony optimization. Inf Sci 422:462–479

    Article  Google Scholar 

  14. Zhu Y, Liang J, Chen J, Ming Z (2017) An improved NSGA-III algorithm for feature selection used in intrusion detection. Knowl-Based Syst 116:74–85

    Article  Google Scholar 

  15. Li AD, He Z, Wang Q, Zhang Y (2019) Key quality characteristics selection for imbalanced production data using a two-phase bi-objective feature selection method. Eur J Oper Res 274(3):978–989

    Article  Google Scholar 

  16. Abdel-Basset M, Chang V, Hawash H, Chakrabortty RK, Ryan M (2020) Deep-IFS: intrusion detection approach for IIoT traffic in fog environment. IEEE Trans Ind Inf 17(11):7704–7715

    Article  Google Scholar 

  17. Alsaedi A, Moustafa N, Tari Z, Mahmood A, Anwar A (2020) TON_IoT telemetry dataset: a new generation dataset of IoT and IIoT for data-driven intrusion detection systems. IEEE Access 8:165130–165150

    Article  Google Scholar 

  18. Latif S, Idrees Z, Zou Z, Ahmad J (2020) DRaNN: a deep random neural network model for intrusion detection in industrial IoT. In: 2020 International Conference on UK–China Emerging Technologies (UCET). IEEE, pp 1–4

  19. Eroglu DY, Kilic K (2017) A novel hybrid genetic local search algorithm for feature selection and weighting with an application in strategic decision making in innovation management. Inf Sci 405:18–32

    Article  Google Scholar 

  20. Hassan MM, Gumaei A, Huda S, Almogren A (2020) Increasing the trustworthiness in the industrial IoT networks through a reliable cyberattack detection model. IEEE Trans Ind Inf 16(9):6154–6162

    Article  Google Scholar 

  21. De Souza CA, Westphall CB, Machado RB, Sobral JBM, dos Santos Vieira G (2020) Hybrid approach to intrusion detection in fog-based IoT environments. Comput Netw 180:107417

    Article  Google Scholar 

  22. Hosseini S, Zade BMH (2020) New hybrid method for attack detection using combination of evolutionary algorithms, SVM, and ANN. Comput Netw 173:107168

    Article  Google Scholar 

  23. Roopak M, Tian GY, Chambers J (2020) Multi-objective-based feature selection for DDoS attack detection in IoT networks. IET Netw 9(3):120–127

    Article  Google Scholar 

  24. Hosseini S (2020) A new machine learning method consisting of GA-LR and ANN for attack detection. Wirel Netw 26(6):4149–4162

    Article  Google Scholar 

  25. Wang C, Wang B, Liu H, Qu H (2020) Anomaly detection for industrial control system based on autoencoder neural network. Wirel Commun Mob Comput 2020:1–10

    Google Scholar 

  26. Jang JW, Kwon S, Kim S, Seo J, Oh J, Lee KH (2020) Cybersecurity framework for IIoT-based power system connected to microgrid. KSII Trans Internet Inf Syst (TIIS) 14(5):2221–2235

    Google Scholar 

  27. Taghavinejad SM, Taghavinejad M, Shahmiri L, Zavvar M, Zavvar MH (2020) Intrusion detection in IoT-based smart grid using hybrid decision tree. In: 2020 6th International Conference on Web Research (ICWR). IEEE, pp 152–156

  28. SumaiyaThaseen I, SairaBanu J, Lavanya K, RukunuddinGhalib M, Abhishek K (2021) An integrated intrusion detection system using correlation-based attribute selection and artificial neural network. Trans Emerg Telecommun Technol 32(2):e4014

    Google Scholar 

  29. Tsogbaatar E, Bhuyan MH, Taenaka Y, Fall D, Gonchigsumlaa K, Elmroth E, Kadobayashi Y (2021) DeL-IoT: a deep ensemble learning approach to uncover anomalies in IoT. Internet Things 14(100391):1–21

    Google Scholar 

  30. Sahu AK, Sharma S, Tanveer M, Raja R (2021) Internet of Things attack detection using hybrid deep learning model. Comput Commun 176:146–151

    Article  Google Scholar 

  31. Yu K, Guo Z, Shen Y, Wang W, Lin JCW, Sato T (2021) Secure artificial Intelligence of Things for implicit group recommendations. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2021.3079574

    Article  Google Scholar 

  32. Tan L, Xiao H, Yu K, Aloqaily M, Jararweh Y (2021) A blockchain-empowered crowdsourcing system for 5g-enabled smart cities. Comput Stand Interfaces 76(103517):1–21

    Google Scholar 

  33. Tan L, Shi N, Yu K, Aloqaily M, Jararweh Y (2021) A blockchain-empowered access control framework for smart devices in green Internet of Things. ACM Trans Internet Technol (TOIT) 21(3):1–20

    Article  Google Scholar 

  34. Feng C, Yu K, Bashir AK, Al-Otaibi YD, Lu Y, Chen S, Zhang D (2021) Efficient and secure data sharing for 5G flying drones: a blockchain-enabled approach. IEEE Netw 35(1):130–137

    Article  Google Scholar 

  35. Zhen L, Bashir AK, Yu K, Al-Otaibi YD, Foh CH, Xiao P (2020) Energy-efficient random access for LEO satellite-assisted 6G internet of remote things. IEEE Internet Things J 8(7):5114–5128

    Article  Google Scholar 

  36. Nie L, Wang X, Wang S, Ning Z, Obaidat M, Sadoun B, Li S (2021) Network traffic prediction in industrial Internet of Things backbone networks: a multi-task learning mechanism. IEEE Trans Ind Inform 17:7123–7132

    Article  Google Scholar 

  37. Zhou F, Qu H, Liu H, Liu H, Li B (2021) Fingerprinting IIoT devices through machine learning techniques. J Signal Process Syst 93:779–794

    Article  Google Scholar 

  38. Ullah I, Mahmoud QH (2021) Network traffic flow based machine learning technique for IoT device identification. In: 2021 IEEE International Systems Conference (SysCon). IEEE, pp 1–8

  39. Rajawat AS, Rawat R, Barhanpurkar K, Shaw RN, Ghosh A (2021) Vulnerability analysis at industrial Internet of Things platform on dark web network using computational intelligence. Comput Intell Syst Appl 950:39–51

    Google Scholar 

  40. Moustafa N (2021) A new distributed architecture for evaluating AI-based security systems at the edge: network TON_IoT datasets. Sustain Cities Soc 72(102994):1–14

    Google Scholar 

  41. Deb K, Jain H (2013) An evolutionary many-objective optimization algorithm using reference-point-based nondominated sorting approach, part I: solving problems with box constraints. IEEE Trans Evol Comput 18(4):577–601

    Article  Google Scholar 

  42. Li X, Xu M, Vijayakumar P, Kumar N, Liu X (2020) Detection of low-frequency and multi-stage attacks in industrial Internet of Things. IEEE Trans Veh Technol 69(8):8820–8831

    Article  Google Scholar 

  43. Mirjalili S, Lewis A (2016) The whale optimization algorithm. Adv Eng Softw 95:51–67

    Article  Google Scholar 

  44. Xue B, Zhang M, Browne WN (2012) Particle swarm optimization for feature selection in classification: a multi-objective approach. IEEE Trans Cybern 43(6):1656–1671

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Achyut Shankar.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix

Appendix

See Tables 10, 11 and 12.

Table 10 Key quality attribute extraction of CTU-13 dataset
Table 11 Key quality attribute extraction of CTU-13 dataset
Table 12 Key quality attribute extraction of gas system dataset

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ikram, S.T., Priya, V., Anbarasu, B. et al. Prediction of IIoT traffic using a modified whale optimization approach integrated with random forest classifier. J Supercomput 78, 10725–10756 (2022). https://doi.org/10.1007/s11227-021-04284-4

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-021-04284-4

Keywords

Navigation